R. Rehim, Python Penetration Testing Cookbook Packt Publishing, 2017.

E. Skoudis and T. Liston, Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2005.

M. Brownfield, Y. Gupta, and N. Davis, Wireless sensor network denial of sleep attack, Proc. 2005 IEEE workshop on information assurance and security, 2005.

S. D. Dalrymple, Comparison of zigbee replay attacks using a universal software radio peripheral and usb radio, 2014.

A. Mauro, X. Fafoutis, S. Mödersheim, and N. Dragoni, Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs, pp.1-16, 2013.

A. Dubey, V. Jain, and A. Kumar, A survey in energy drain attacks and their countermeasures in wireless sensor networks, Int. J. Eng. Res. Technol, vol.3, issue.2, 2014.

R. Falk and H. Hof, Fighting insomnia: A secure wake-up scheme for wireless sensor networks, 3rd International Conference on Emerging Security Information, Systems and Technologies, 2009. IEEE SECURWARE'09, pp.191-196, 2009.

F. Francois, O. H. Abdelrahman, and E. Gelenbe, Impact of signaling storms on energy consumption and latency of lte user equipment, 2015 IEEE 7th Int. Symp. on Cyberspace Safety and Security, pp.1248-1255, 2015.

Y. W. Law, M. Palaniswami, L. Van-hoesel, J. Doumen, P. Hartel et al., Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols, ACM Trans. Sen. Netw, vol.5, issue.1, 2009.

X. Lu, M. Spear, K. Levitt, N. S. Matloff, and S. F. Wu, A synchronization attack and defense in energy-efficient listen-sleep slotted mac protocols, Int. Conf. on Emerging Security Information, Systems and Technologies, p.2, 2008.

M. Pirretti, S. Zhu, N. Vijaykrishnan, P. Mcdaniel, M. Kandemir et al., The sleep deprivation attack in sensor networks: Analysis and methods of defense, Int. Journal of Distributed Sensor Networks, vol.2, issue.3, pp.267-287, 2006.

F. Stajano and R. Anderson, The resurrecting duckling: Security issues for ad-hoc wireless networks, 7th Int. Workshop Security Protocols, 1999.

E. Y. Vasserman and N. Hopper, Vampire attacks: Draining life from wireless ad hoc sensor networks, IEEE Trans. Mobile Computing, vol.12, issue.2, pp.318-332, 2013.

E. Gelenbe and Y. Yin, Deep Learning with Dense Random Neural Networks, Proc. Int. Conf. on Man-Machine Interactions, pp.3-18, 2017.

Y. Yin and E. Gelenbe, Single-cell based random neural network for deep learning, Neural Networks (IJCNN), 2017 Int. Joint Conference on, pp.86-93, 2017.

E. Gelenbe and Y. Yin, Deep learning with random neural networks. Neural Networks (IJCNN), 2016 Int. Joint Conference on, pp.1633-1638, 2016.

E. Gelenbe, Learning in the recurrent random neural network, Neural Computation, vol.5, issue.1, pp.154-164, 1993.

E. Gelenbe, Random neural networks with negative and positive signals and product form solution, Neural Computation, vol.1, issue.4, pp.502-510, 1989.

A. Collen, N. A. Nijdam, J. Augusto-gonzalez, S. K. Katsikas, K. M. Giannoutakis et al., GHOST -Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control, Proceedings of the 2018 ISCIS Security Workshop, 2018.